SSL Support Team
Elliptic Curve Cryptography explained: Efficient public-key encryption for modern cybersecurity, from web security to cryptocurrencies.
Read More »
What is a Cryptographic Protocol?
Discover cryptographic protocols—rules ensuring secure communication and data protection online, including SSL/TLS, SSH, and more.
Read More »
What is Public-Key Cryptography?
Learn about public-key cryptography, its applications in SSL/TLS, and how it secures digital communications. Explore algorithms, benefits, and future trends in online security.
Read More »
Certificate Transparency
An exploration of Certificate Transparency (CT), its importance, recent developments, and future directions in web security.
Read More »
What is HTTP Strict Transport Security (HSTS)?
Learn about HTTP Strict Transport Security (HSTS), a crucial web security mechanism that enforces HTTPS connections. Discover its benefits, implementation steps, and best practices for protecting your website against common attacks.
Read More »
What is a Code Signing Certificate?
Learn about code signing certificates: what they are, how they work, their benefits for software security and trust, and best practices for implementation. Explore SSL.com solutions.
Read More »
Unified Communications Certificate (UCC): A Comprehensive Guide
Learn about Unified Communications Certificates (UCCs), how they secure multiple domains, their benefits, and best practices for implementation and management.
Read More »
What is a Root Store?
Root stores: Key components of internet security. Learn about these trusted certificate collections and their role in cybersecurity.
Read More »
Bulk Certificate Enrollment for S/MIME and ClientAuth Certificates
SSL.com provides an efficient way to order a high volume of digital certificates through the bulk order tool. It is capable of processing all validation
Read More »
Cybersecurity Roundup August 2024
Stay informed with SSL.com’s August 2024 Cybersecurity Roundup, featuring insights on PEAKLIGHT malware, BlackByte ransomware, and others. Learn more!
Read More »
What is a Site Seal?
SSL.com Smart Seal: Free with every certificate. Real-time reports and validated documents build trust and enhance website security.
Read More »
Using Your Code Signing Certificate
How to use your OV or EV code signing certificate with Microsoft’s SignTool and SSL.com’s SSL Manager application.
Read More »
Code Signing Certificates, Cloud Signing Options and Signing Operations Integration
What is a Code Signing Certificate? A code signing certificate is a digital certificate that provides a globally accepted proof of identity of a software
Read More »
SafeNet Authentication Client Download for Code Signing Certificates
How to download the SafeNet client. For certificates on Thales-Gemalto USB tokens.
Read More »
What is a Wildcard SSL Certificate?
Wildcard SSL Certificates secure multiple subdomains under one domain. This article explains their function and best uses.
Read More »
What are Root Certificates, and Why Do They Matter?
Root certificates are one of the pillars of internet security. They are the basis of validating the identity of websites through SSL/TLS certificates, providing digital
Read More »
How to Change your Thales SafeNet/Gemalto Token Password
This article provides instructions for Thales SafeNet (Gemalto) token users who want to change their token code signing password and for those who need to
Read More »
The Essential Guide to Certificate Lifecycle Management
Understanding and managing certificates effectively is crucial for any organization operating online. At SSL.com, we specialize in providing certificate management solutions that simplify this essential
Read More »
What Is a Cryptographic Hash Function?
Cryptographic hash functions are essential for modern cybersecurity, enabling secure digital signatures, password protection, and more. Discover why these functions are crucial and how they’ve evolved in our full article.
Read More »
Digital Certificate Revocation
Digital certificate revocation is key to PKI security. Learn why it matters and how to manage it in our article.
Read More »
What is the “Unique Value” Used in Domain Validation (DV)?
Domain Validation (DV) is a crucial step in obtaining an SSL/TLS certificate for your website. A key component of this process is the “unique value” used to verify domain ownership.
Read More »
Cybersecurity Roundup July 2024
SSL.com and Entrust Form Strategic Partnership SSL.com is proud to announce a strategic partnership with Entrust, where SSL.com will support Entrust’s public TLS certificate lifecycle,
Read More »
Enabling Third-Party Signing Certificates with eSigner Cloud Signing
Discover how SSL.com’s eSigner cloud signing service securely stores and utilizes third-party digital certificates and keys for enhanced digital signing from anywhere
Read More »
Send a Secure Email using a S/MIME Certificate in the new Outlook for Mac
Learn how to send secure emails using an S/MIME certificate in the new Outlook for Mac. This step-by-step guide by SSL.com ensures your emails are encrypted and authenticated for enhanced security and privacy.
Read More »
SSL.com and Entrust Form Strategic Partnership
SSL.com is pleased to announce a new partnership with Entrust. This collaboration will see SSL.com supporting Entrust’s public TLS certificate lifecycle, ensuring that Entrust continues to meet the highest standards of reliability and customer satisfaction. Entrust will leverage SSL.com’s expertise and full browser ubiquity to provide seamless, secure, and robust certificate services.
Read More »